ntfy/server/visitor.go

226 lines
6.6 KiB
Go
Raw Normal View History

2021-11-01 19:21:38 +00:00
package server
import (
2021-12-25 14:15:05 +00:00
"errors"
2022-12-02 20:37:48 +00:00
"heckel.io/ntfy/auth"
"net/netip"
2021-11-01 19:21:38 +00:00
"sync"
"time"
"golang.org/x/time/rate"
"heckel.io/ntfy/util"
2021-11-01 19:21:38 +00:00
)
const (
2021-12-23 23:03:04 +00:00
// visitorExpungeAfter defines how long a visitor is active before it is removed from memory. This number
// has to be very high to prevent e-mail abuse, but it doesn't really affect the other limits anyway, since
// they are replenished faster (typically).
visitorExpungeAfter = 24 * time.Hour
2021-11-01 19:21:38 +00:00
)
2021-12-25 14:15:05 +00:00
var (
errVisitorLimitReached = errors.New("limit reached")
)
2021-11-01 19:21:38 +00:00
// visitor represents an API user, and its associated rate.Limiter used for rate limiting
type visitor struct {
2022-12-19 14:59:32 +00:00
config *Config
messageCache *messageCache
ip netip.Addr
user *auth.User
messages int64 // Number of messages sent
emails int64 // Number of emails sent
requestLimiter *rate.Limiter // Rate limiter for (almost) all requests (including messages)
emailsLimiter *rate.Limiter // Rate limiter for emails
subscriptionLimiter util.Limiter // Fixed limiter for active subscriptions (ongoing connections)
2022-12-19 14:59:32 +00:00
bandwidthLimiter util.Limiter
2022-12-24 17:10:51 +00:00
accountLimiter *rate.Limiter // Rate limiter for account creation
firebase time.Time // Next allowed Firebase message
2022-12-19 14:59:32 +00:00
seen time.Time
mu sync.Mutex
2021-11-01 19:21:38 +00:00
}
2022-04-03 16:39:52 +00:00
type visitorStats struct {
2022-12-19 21:22:13 +00:00
Basis string // "ip", "role" or "plan"
Messages int64
MessagesLimit int64
MessagesRemaining int64
Emails int64
EmailsLimit int64
EmailsRemaining int64
AttachmentTotalSize int64
AttachmentTotalSizeLimit int64
AttachmentTotalSizeRemaining int64
AttachmentFileSizeLimit int64
2022-04-03 16:39:52 +00:00
}
2022-12-02 20:37:48 +00:00
func newVisitor(conf *Config, messageCache *messageCache, ip netip.Addr, user *auth.User) *visitor {
2022-12-24 17:10:51 +00:00
var requestLimiter, emailsLimiter, accountLimiter *rate.Limiter
var messages, emails int64
if user != nil {
messages = user.Stats.Messages
emails = user.Stats.Emails
2022-12-24 17:10:51 +00:00
} else {
accountLimiter = rate.NewLimiter(rate.Every(conf.VisitorAccountCreateLimitReplenish), conf.VisitorAccountCreateLimitBurst)
}
if user != nil && user.Plan != nil {
2022-12-19 21:22:13 +00:00
requestLimiter = rate.NewLimiter(dailyLimitToRate(user.Plan.MessagesLimit), conf.VisitorRequestLimitBurst)
emailsLimiter = rate.NewLimiter(dailyLimitToRate(user.Plan.EmailsLimit), conf.VisitorEmailLimitBurst)
} else {
2022-12-18 19:35:05 +00:00
requestLimiter = rate.NewLimiter(rate.Every(conf.VisitorRequestLimitReplenish), conf.VisitorRequestLimitBurst)
2022-12-19 21:22:13 +00:00
emailsLimiter = rate.NewLimiter(rate.Every(conf.VisitorEmailLimitReplenish), conf.VisitorEmailLimitBurst)
}
2021-11-01 19:21:38 +00:00
return &visitor{
2022-12-19 14:59:32 +00:00
config: conf,
messageCache: messageCache,
ip: ip,
user: user,
messages: messages,
emails: emails,
2022-12-19 14:59:32 +00:00
requestLimiter: requestLimiter,
2022-12-19 21:22:13 +00:00
emailsLimiter: emailsLimiter,
2022-12-19 14:59:32 +00:00
subscriptionLimiter: util.NewFixedLimiter(int64(conf.VisitorSubscriptionLimit)),
bandwidthLimiter: util.NewBytesLimiter(conf.VisitorAttachmentDailyBandwidthLimit, 24*time.Hour),
2022-12-24 17:10:51 +00:00
accountLimiter: accountLimiter, // May be nil
2022-12-19 14:59:32 +00:00
firebase: time.Unix(0, 0),
seen: time.Now(),
2021-11-01 19:21:38 +00:00
}
}
func (v *visitor) RequestAllowed() error {
2022-12-18 19:35:05 +00:00
if !v.requestLimiter.Allow() {
2021-12-25 14:15:05 +00:00
return errVisitorLimitReached
2021-12-23 23:03:04 +00:00
}
return nil
}
2022-06-01 00:38:56 +00:00
func (v *visitor) FirebaseAllowed() error {
v.mu.Lock()
defer v.mu.Unlock()
if time.Now().Before(v.firebase) {
return errVisitorLimitReached
}
return nil
}
func (v *visitor) FirebaseTemporarilyDeny() {
v.mu.Lock()
defer v.mu.Unlock()
2022-06-01 03:27:24 +00:00
v.firebase = time.Now().Add(v.config.FirebaseQuotaExceededPenaltyDuration)
2022-06-01 00:38:56 +00:00
}
2021-12-23 23:03:04 +00:00
func (v *visitor) EmailAllowed() error {
2022-12-19 14:59:32 +00:00
if !v.emailsLimiter.Allow() {
2021-12-25 14:15:05 +00:00
return errVisitorLimitReached
2021-11-01 19:21:38 +00:00
}
return nil
}
2021-12-25 14:15:05 +00:00
func (v *visitor) SubscriptionAllowed() error {
2021-11-01 19:21:38 +00:00
v.mu.Lock()
defer v.mu.Unlock()
2022-12-19 14:59:32 +00:00
if err := v.subscriptionLimiter.Allow(1); err != nil {
2021-12-25 14:15:05 +00:00
return errVisitorLimitReached
2021-11-01 19:21:38 +00:00
}
return nil
}
func (v *visitor) RemoveSubscription() {
v.mu.Lock()
defer v.mu.Unlock()
2022-12-19 14:59:32 +00:00
v.subscriptionLimiter.Allow(-1)
2021-11-01 19:21:38 +00:00
}
func (v *visitor) Keepalive() {
v.mu.Lock()
defer v.mu.Unlock()
v.seen = time.Now()
}
2022-01-13 02:24:48 +00:00
func (v *visitor) BandwidthLimiter() util.Limiter {
2022-12-19 14:59:32 +00:00
return v.bandwidthLimiter
2022-01-12 23:52:07 +00:00
}
2021-11-01 19:21:38 +00:00
func (v *visitor) Stale() bool {
v.mu.Lock()
defer v.mu.Unlock()
return time.Since(v.seen) > visitorExpungeAfter
}
2022-04-03 16:39:52 +00:00
2022-12-19 14:59:32 +00:00
func (v *visitor) IncrMessages() {
v.mu.Lock()
defer v.mu.Unlock()
v.messages++
if v.user != nil {
v.user.Stats.Messages = v.messages
}
2022-12-19 14:59:32 +00:00
}
func (v *visitor) IncrEmails() {
v.mu.Lock()
defer v.mu.Unlock()
v.emails++
if v.user != nil {
v.user.Stats.Emails = v.emails
}
2022-12-19 14:59:32 +00:00
}
2022-04-03 16:39:52 +00:00
func (v *visitor) Stats() (*visitorStats, error) {
2022-12-19 14:59:32 +00:00
v.mu.Lock()
2022-12-20 02:42:36 +00:00
messages := v.messages
emails := v.emails
v.mu.Unlock()
2022-12-19 21:22:13 +00:00
stats := &visitorStats{}
if v.user != nil && v.user.Role == auth.RoleAdmin {
stats.Basis = "role"
stats.MessagesLimit = 0
stats.EmailsLimit = 0
stats.AttachmentTotalSizeLimit = 0
stats.AttachmentFileSizeLimit = 0
} else if v.user != nil && v.user.Plan != nil {
stats.Basis = "plan"
stats.MessagesLimit = v.user.Plan.MessagesLimit
stats.EmailsLimit = v.user.Plan.EmailsLimit
stats.AttachmentTotalSizeLimit = v.user.Plan.AttachmentTotalSizeLimit
stats.AttachmentFileSizeLimit = v.user.Plan.AttachmentFileSizeLimit
} else {
stats.Basis = "ip"
stats.MessagesLimit = replenishDurationToDailyLimit(v.config.VisitorRequestLimitReplenish)
stats.EmailsLimit = replenishDurationToDailyLimit(v.config.VisitorEmailLimitReplenish)
2022-12-20 02:42:36 +00:00
stats.AttachmentTotalSizeLimit = v.config.VisitorAttachmentTotalSizeLimit
2022-12-19 21:22:13 +00:00
stats.AttachmentFileSizeLimit = v.config.AttachmentFileSizeLimit
}
2022-12-20 02:42:36 +00:00
var attachmentsBytesUsed int64
var err error
if v.user != nil {
attachmentsBytesUsed, err = v.messageCache.AttachmentBytesUsedByUser(v.user.Name)
} else {
attachmentsBytesUsed, err = v.messageCache.AttachmentBytesUsedBySender(v.ip.String())
}
if err != nil {
return nil, err
}
stats.Messages = messages
stats.MessagesRemaining = zeroIfNegative(stats.MessagesLimit - stats.Messages)
2022-12-20 02:42:36 +00:00
stats.Emails = emails
stats.EmailsRemaining = zeroIfNegative(stats.EmailsLimit - stats.Emails)
2022-12-19 21:22:13 +00:00
stats.AttachmentTotalSize = attachmentsBytesUsed
stats.AttachmentTotalSizeRemaining = zeroIfNegative(stats.AttachmentTotalSizeLimit - stats.AttachmentTotalSize)
return stats, nil
}
func zeroIfNegative(value int64) int64 {
if value < 0 {
return 0
}
return value
}
func replenishDurationToDailyLimit(duration time.Duration) int64 {
return int64(24 * time.Hour / duration)
}
func dailyLimitToRate(limit int64) rate.Limit {
return rate.Limit(limit) * rate.Every(24*time.Hour)
2022-04-03 16:39:52 +00:00
}